• Title/Summary/Keyword: 존재 증명

Search Result 529, Processing Time 0.024 seconds

Numerical Analysis of Shear Stresses in Framed Tube Structures with Internal Tube(s) (내부튜브가 있는 골조 튜브 구조물의 전단응력에 대한 수치해석)

  • Lee, Kang-Kun;Lee, Lee-Hyung
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.15 no.3
    • /
    • pp.511-521
    • /
    • 2002
  • A simple numerical modelling technique is proposed for estimating the shear stress distribution in beams of framed tube structures with multiple internal tubes. The structures arc analysed using a continuum approach in which each tube is individually modelled by a tube beam that accounts for the flexural and shear deformations, as well as the shear lag effects. The numerical analysis of shear stress is based on the mathematical analogy in conjunction with the elastic theory By simplifying assumptions regarding the form of strain distributions in external and internal tubes, the shear stress distributions are expressed in terms of a series of lineal functions of the second moments of area of the structures and the corresponding geometric and material properties, as well as the applied loads. Previous studies for axial stresses and shear lag phenomenon are further developed lot the numerical analysis of shear stresses in the tubes. The simplicity and accuracy of the proposed method are demonstrated through the solutions of throe numerical examples.

Effects of Atomic Intermixing of Ta/NiFe Interface on Magnetoresistance and Magnetic Properties in a Ta/NiFe/Cu/NiFe/FeMn/Ta Spin Valve Structure (Ta/NiFe/Cu/NiFe/FeMn/Ta계 스핀밸브 제조시 Ta/NiFe 계면원자섞임이 스핀밸브의 자기저항과 자기적 특성에 미치는 영향)

  • 오세층;이택동
    • Journal of the Korean Magnetics Society
    • /
    • v.8 no.5
    • /
    • pp.288-294
    • /
    • 1998
  • Effect of degree of intermixing at the Ta/NiFe interface induced by varying applied substrate bias voltage during NiFe free layer deposition on change of magnetoresistance in Substrate/Ta/NiFe/Cu/NiFe/FeMn/Ta spin valve multilayers was investigated. It was found that the optimum NiFe free layer thickness showing a maximum MR increase with increasing the bias voltage. The increase of the optimum thickness was due to the increase of the intermixed layer thickness with a bias voltage. The weak ferromagnetic or non ferromagnetic intermixed layer plays as a spin-independent scattering region and does not contribute on spin-dependent scattering. The existence of the intermixed layer was proved by the means of electrical resistivity and magnetization changes. In the present study, the optimum "effective" free layer thickness which gives the highest MR ratio was a constant independent of the magnitude of the bias voltage we have used.have used.

  • PDF

A Study of a Secure Smart Car System using Attribute-based Delegation Method (속성 기반 권한위임 관리 기법을 사용한 스마트 자동차 안전성 검토에 관한 연구)

  • Kim, Jin-Mook;Moon, Jeong-Kyung;Hwang, Deuk-Young
    • Convergence Security Journal
    • /
    • v.19 no.3
    • /
    • pp.71-79
    • /
    • 2019
  • The demand of smart cars is increasing rapidly. International stand organize such as 3GPP and 5GAA are proposing standard communication protocvols for connected-car, and automotive network infrastructure. But Smart car network have many security threats and more dangerous against the existed wire communication network. Typically, peripheral devices of a smart car may disguise their identity and steal location information and personal information about the vehicle. In addition, the infrastructure elements around smart cars can conspire and put driving cars in danger, threatening lives. This is a very serious security threat. Therefore, in order to solve these problems, we proposed a system that is secure from collusion and tampering attacks using attribute-based authorize delegation method and threshold encryption algorithms. We have demonstrated using a semantic safety model that the proposed system can be safe from collusion attack.

Effective ToA-Based Indoor Localization Method Considering Accuracy in Wireless Sensor Networks (무선 센서 네트워크 상에서 정확도를 고려한 효과적인 도래시간 기반 무선실내측위방법)

  • Go, Seungryeol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.6
    • /
    • pp.640-651
    • /
    • 2016
  • We propose an effective ToA-based localization method considering accuracy in indoor environments. The purpose of the localization system is to estimate the coordinates of the geographic location of target device. In indoor environments, accurately estimating the location of a target device is not easy due to various errors. The accuracy of wireless localization is influenced by NLOS errors. ToA-based localization measures the location of a target device using the distances between a mobile device and three or more base stations. However, each of the NLOS errors along a distance estimated from a target device to a base station is different because of dissimilar obstacles. To accurately estimate the target's location, an optimized localization process is needed in indoor environments. In this paper, effective ToA-based localization method process is proposed for improving accuracy in wireless sensor networks. Performance evaluations are presented, and the experimental localization system results are proved through comparisons of various localization methods with the proposed methods.

A Study of Attacks to Bypass CFI on Android Application Environment (안드로이드 애플리케이션 환경에서 CFI 우회 공격기법 연구)

  • Lee, Ju-yeop;Choi, Hyoung-kee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.881-893
    • /
    • 2020
  • CFI(Control Flow Integrity) is a mitigation mechanism that protects programs by verifying control flows. IFCC(Indirect Function Call Checks) and SCS(Shadow Call Stack), CFI supported by LLVM Clang compiler, were introduced to protect applications in Android. IFCC protects function calls and SCS protects function returns. In this paper, we propose attacks to bypass CFI on the application environment with IFCC and SCS. Even if IFCC and SCS were applied to user applications, it was confirmed that there were many code segments not protected by IFCC and SCS in the application memory. We execute code in CFI unprotected segments to construct 1) bypassing IFCC to call a protected function, 2) modulating return address via SCS bypass. We identify code segments not protected by IFCC and SCS in Android10 QP1A. 191005.007.A3. We also implement proof-of-concept exploits to demonstrate that modulation of control flow is possible in an environment where IFCC and SCS are applied.

Observation and Compensation of Voltage Distortion of PWM VSI for PMSM using Adaptive Control Method (영구자석 동기전동기 구동을 위한 전압원 인버터의 적응제어기법을 이용한 전압 왜곡 관측 및 보상)

  • Kim Hag-Wone;Youn Myung-Joong;Kim Hyun-Soo;Cho Kwan-Youl
    • The Transactions of the Korean Institute of Power Electronics
    • /
    • v.10 no.1
    • /
    • pp.52-60
    • /
    • 2005
  • Generally, a voltage difference or voltage distortion exists between the reference voltage and the practical voltage applied to a motor in a pulse width modulated(PWM) voltage source inverter(VSI). This voltage distortion varies with the operating conditions such as the temperature, DC link voltage, and phase current level. Also the voltage distortion affects the machine current distortion, torque pulsations, and control performance. In this paper, the voltage distortion in a PWM VSI is analyzed and a new on-line estimation method based on the model reference adaptive system(MRAS) is proposed to compensate the time varying voltage distortion, while considering the parameter variations for a permanent magnet synchronous motor (PMSM). The simulation and experimental results show the effectiveness of the proposed voltage difference observer and the compensation method.

Establishment of Automatic Response System for Disaster Prevention using GIS (GIS를 이용한 재해상황 자동음성 통보시스템 구축)

  • Jung, Dae-Young;Bang, Hee-Bong;Shin, Young-Chul
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.5 no.1
    • /
    • pp.69-79
    • /
    • 2002
  • The more people and urban infrastructures are crowded in a society, the more possibilities of disasters are existed. Most of cities have a difficulty in coping with unpredictable disasters consisting of natural and human characteristics. As a proved before, theses disasters have serious effects on socio-economical, financial and physical damages, and human lives. Although we have prepared various types of disaster-protection programs, there are rooms to be desired in establishing advanced warning system towards safeguards of disasters. In this research, we propose semantic ideas of an advanced information system associated with automatic voicing mail linking to telephone. This conceptual model and its architecture is for not only predicting and analyzing disasters, but also recommending counter-measurements and solutions for risks and dangers in disastrous circumstances. However, there are little works with regard to definitions and conceptual models of automatic voicing mail system in the context of geographical information sciences. Therefore, this research focuses on scrutinizing the effect of possible natural vulnerability and human hazards in our present societies.

  • PDF

Investigation of Sensor Models for Precise Geolocation of GOES-9 Images (GOES-9 영상의 정밀기하보정을 위한 여러 센서모델 분석)

  • Hur, Dong-Seok;Kim, Tae-Jung
    • Korean Journal of Remote Sensing
    • /
    • v.22 no.4
    • /
    • pp.285-294
    • /
    • 2006
  • A numerical formula that presents relationship between a point of a satellite image and its ground position is called a sensor model. For precise geolocation of satellite images, we need an error-free sensor model. However, the sensor model based on GOES ephemeris data has some error, in particular after Image Motion Compensation (IMC) mechanism has been turned off. To solve this problem, we investigated three sensor models: collinearity model, direct linear transform (DLT) model and orbit-based model. We applied matching between GOES images and global coastline database and used successful results as control points. With control points we improved the initial image geolocation accuracy using the three models. We compared results from three sensor models. As a result, we showed that the orbit-based model is a suitable sensor model for precise geolocation of GOES-9 Images.

A Study on Group Key Generation and Exchange using Hash Collision in M2M Communication Environment (M2M 통신 환경에서 해시 충돌을 이용한 그룹키 생성 및 교환 기법 연구)

  • Song, Jun-Ho;Kim, Sung-Soo;Jun, Moon-Seog
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.5
    • /
    • pp.9-17
    • /
    • 2019
  • As the IoT environment becomes more popular, the safety of the M2M environment, which establishes the communication environment between objects and objects without human intervention, becomes important. Due to the nature of the wireless communication environment, there is a possibility of exposure to security threats in various aspects such as data exposure, falsification, tampering, deletion and privacy, and secure communication security technology is considered as an important requirement. In this paper, we propose a new method for group key generation and exchange using trap hash collision hash in existing 'M2M communication environment' using hash collision, And a mechanism for confirming the authentication of the device and the gateway after the group key is generated. The proposed method has attack resistance such as spoofing attack, meson attack, and retransmission attack in the group communication section by using the specificity of the collision message and collision hash, and is a technique for proving safety against vulnerability of hash collision.

The Non-fiction Participants in the Reality Observational Entertainment Program as Social Actors: Focusing on Youn's Kitchen Season 2 (사회적 배우로서의 리얼리티 관찰 예능 프로그램의 일반인 참여자: <윤식당2>를 중심으로)

  • Ryu, Jae Hyung
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.10
    • /
    • pp.274-289
    • /
    • 2019
  • The purpose of this study is to regard the non-fiction participants in the reality observational entertainment program as social actors. For this, the study has examined the concepts of social actor and performance, understood how the performances of social actors are projected onto the screen, and textually analyzed Youn's Kitchen season 2. As a result, the non-fiction participants(the guests) of Youn's Kitchen functioned as the social actors who performed the roles derived from their social relations under the consciousness of the camera. The more the number of social actors in the observational space increased, the more the number of their performing roles grew. Their everyday activities have been chosen by various filmic devices, such as the cameras, within the specific frame of hybrid performance mode that representational and presentational performances coexist.